Group key establishment (GKE): Two/three party key exchange to GKE

S. Vivek, S. S. D. Selvi, Deepanshu Shukla, C. Rangan
{"title":"Group key establishment (GKE): Two/three party key exchange to GKE","authors":"S. Vivek, S. S. D. Selvi, Deepanshu Shukla, C. Rangan","doi":"10.1109/ANTS.2012.6524229","DOIUrl":null,"url":null,"abstract":"This work presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers where the first one is a 2-KE to GKE compiler (2-TGKE) for tree topology, the second one is also for tree topology but from 3-KE to GKE (3-TGKE) and the third one is a compiler that constructs a GKE from 3-KE for circular topology. Our compilers 2-TGKE and 3-TGKE are first of their kind and are efficient due to the underlying tree topology. For the circular topology, we design a compiler called 3-CGKE. By extending the compilers 2-TGKE and 3-TGKE using the techniques in [?], scalable compilers for tree based authenticated group key exchange protocols (2-TAGKE/3-TAGKE), that are secure against active adversaries can be constructed. As an added advantage our compilers can be used in a setting where there is asymmetric distribution of computing power and hence applicable for low power devices such as PDA's, palmtops, sensor network nodes and mobile phones.","PeriodicalId":340711,"journal":{"name":"2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTS.2012.6524229","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This work presents the first scalable, efficient and generic compilers to construct group key exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose three different compilers where the first one is a 2-KE to GKE compiler (2-TGKE) for tree topology, the second one is also for tree topology but from 3-KE to GKE (3-TGKE) and the third one is a compiler that constructs a GKE from 3-KE for circular topology. Our compilers 2-TGKE and 3-TGKE are first of their kind and are efficient due to the underlying tree topology. For the circular topology, we design a compiler called 3-CGKE. By extending the compilers 2-TGKE and 3-TGKE using the techniques in [?], scalable compilers for tree based authenticated group key exchange protocols (2-TAGKE/3-TAGKE), that are secure against active adversaries can be constructed. As an added advantage our compilers can be used in a setting where there is asymmetric distribution of computing power and hence applicable for low power devices such as PDA's, palmtops, sensor network nodes and mobile phones.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
组密钥建立(GKE):向GKE交换两方/三方密钥
这项工作提出了第一个可扩展的、高效的和通用的编译器,用于从两/三方密钥交换(2-KE/3-KE)协议构建组密钥交换(GKE)协议。我们提出了三种不同的编译器,其中第一个是树形拓扑的2-KE到GKE编译器(2-TGKE),第二个也是树形拓扑,但从3-KE到GKE (3-TGKE),第三个是编译器,从3-KE构造一个圆形拓扑的GKE。我们的编译器2-TGKE和3-TGKE是同类中的第一个,并且由于底层树拓扑结构而高效。对于圆形拓扑,我们设计了一个名为3-CGKE的编译器。通过使用[?]中的技术扩展编译器2-TGKE和3-TGKE],可扩展的编译器,用于基于树的认证组密钥交换协议(2-TAGKE/3-TAGKE),可以构建安全的主动对手。作为一个额外的优势,我们的编译器可以在计算能力不对称分布的环境中使用,因此适用于低功耗设备,如PDA,掌上电脑,传感器网络节点和移动电话。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Performance analysis of cooperative LDPC coding for wireless network Supporting Tuple Space based Mobile Middleware over unreliable mobile infrastructures: Design and formal specifications Supporting dual-mode forwarding in content-centric network Performance comparison of various PSK modulation schemes for ultra-high speed long-haul fiber-optic communication system Identity driven capability based access control (ICAC) scheme for the Internet of Things
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1